Marthe,

On Wed, Jul 22, 2009 at 12:23 PM, Marthe
Engebretsen<[email protected]> wrote:
> Andrés,
>
> -----Original Message-----
> From: Andres Riancho [mailto:[email protected]]
> Sent: Wednesday, July 22, 2009 5:05 PM
> To: Marthe Engebretsen
> Cc: [email protected]
> Subject: Re: [W3af-users] Blind SQL plugin - Too many retries
>
> Marthe,
>
> On Wed, Jul 22, 2009 at 11:51 AM, Marthe
> Engebretsen<[email protected]> wrote:
>>
>>
>> -----Original Message-----
>> From: Andres Riancho [mailto:[email protected]]
>> Sent: Monday, July 20, 2009 4:27 PM
>> To: Marthe Engebretsen
>> Cc: [email protected]
>> Subject: Re: [W3af-users] Blind SQL plugin - Too many retries
>>
>> Marthe,
>>
>> On Mon, Jul 20, 2009 at 11:22 AM, Marthe
>> Engebretsen<[email protected]> wrote:
>>> Andrés,
>>>
>>> Marthe,
>>>
>>> On Mon, Jul 20, 2009 at 10:20 AM, Marthe
>>> Engebretsen<[email protected]> wrote:
>>>> Dear list,
>>>>
>>>> I've been testing W3AF for some weeks now, as part of a large project
>>>> concerning web application security and web application vulnerability
>>>> scanning.  W3AF is one of my absolute favorites of the tools tested, but
>>>> recently I've got some problems when scanning my "known vulnerable test
>>>> site" for SQL Injections.
>>>>
>>>> In order to check how the tool manage blind SQL injections my  test site 
>>>> has
>>>> been modified to not show database error messages (MySQL-database). When 
>>>> the
>>>> blindSqli plugin is enabled it only returns:" Too many retries when trying
>>>> to get: . URL.". I've tried to tune both blindSqli-plugin settings and
>>>> http-settings, but I still get the same result.
>>>>
>>>> Any ideas on what the problem is, and how to get the plugin to work
>>>> properly?
>>>
>>> Are you using some kind of IPS, that could be closing TCP connections
>>> based on the packet payloads?
>>>
>>> No, there are no IPS. The test server is only protected by IP restrictions.
>>
>> Then I have no clue of what could be happening, I would need more
>> information, logs, etc. to be able to try to find what's happening.
>> Have you tried to use wireshark to see what's going bad at a TCP/IP
>> level? Usually these type of errors are because of connection errors
>> at that level. Maybe packets are being dropped?
>>
>> Another idea: maybe you could run w3af with the output.textFile plugin
>> with the verbose parameter set to true, and analyze that?
>>
>> ---
>> I've had a look in the verbose textFile and found some interesting results, 
>> even though it's not related to the "too many retries"-problem.
>>
>> Why is this vulnerability just marked as "debug":
>> [ 07/21/09 09:38:39 - debug ] GET http://testsite/index.php?p=movie&id=4 OR 
>> 29=29  returned HTTP code "200" - id: 3728
>> [ 07/21/09 09:38:39 - debug ] GET http://testsite/index.php?p=movie&id=4 AND 
>> 29=30  returned HTTP code "200" - id: 3729
>> [ 07/21/09 09:38:39 - debug ] Comparing secondTrueResponse and trueResponse.
>> [ 07/21/09 09:38:39 - debug ] Pages are equal, match rate: 0.991228070175
>> [ 07/21/09 09:38:39 - debug ] Comparing secondFalseResponse and 
>> falseResponse.
>> [ 07/21/09 09:38:39 - debug ] Pages are equal, match rate: 0.979166666667
>> [ 07/21/09 09:38:39 - debug ] Blind SQL injection was found at: 
>> "http://testsite/index.php";, using HTTP method GET. The injectable parameter 
>> is: "id". This vulnerability was found in the requests with ids 3728 and 
>> 3729.
>>
>> While this vulnerability is marked as "vulnerability":
>> [ 07/21/09 09:47:21 - debug ] GET http://testsite/index.php?comment=1 or 
>> BENCHMARK(2500000,MD5(1))&p=movie&id=5 returned HTTP code "200" - id: 4268
>> [ 07/21/09 09:47:21 - vulnerability ] Blind SQL injection was found at: 
>> "http://testsite/index.php";, using HTTP method GET. The sent data was: 
>> "comment=1+or+BENCHMARK%282500000%2CMD5%281%29%29&p=movie&id=5". The 
>> modified parameter was "comment". This vulnerability was found in the 
>> request with id 4268.
>>
>> Is there a good explanation for this, or is it a bug?
>
> I think that you should see the same line, but with a vulnerability
> tag some lines below. Please let me know if you don't find it.
>
> ---
> When grep-ing for "vulnerability" only 33 debug-entries are shown in addition 
> to the one mentioned which has a vulnerability-tag.

And the scan finished successfully?

> Cheers,
> Marthe Engebretsen
>
>
>>
>>
>>>
>>>>
>>>> ------------------------------------------------------------------------------
>>>> Enter the BlackBerry Developer Challenge
>>>> This is your chance to win up to $100,000 in prizes! For a limited time,
>>>> vendors submitting new applications to BlackBerry App World(TM) will have
>>>> the opportunity to enter the BlackBerry Developer Challenge. See full prize
>>>> details at: http://p.sf.net/sfu/Challenge
>>>> _______________________________________________
>>>> W3af-users mailing list
>>>> [email protected]
>>>> https://lists.sourceforge.net/lists/listinfo/w3af-users
>>>>
>>>>
>>>
>>>
>>>
>>> --
>>> Andrés Riancho
>>> Founder, Bonsai - Information Security
>>> http://www.bonsai-sec.com/
>>> http://w3af.sf.net/
>>>
>>
>>
>>
>> --
>> Andrés Riancho
>> Founder, Bonsai - Information Security
>> http://www.bonsai-sec.com/
>> http://w3af.sf.net/
>>
>
>
>
> --
> Andrés Riancho
> Founder, Bonsai - Information Security
> http://www.bonsai-sec.com/
> http://w3af.sf.net/
>



-- 
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/

------------------------------------------------------------------------------
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to